Fig. 4From: Under false flag: using technical artifacts for cyber attack attributionTypes of artifacts gathered from technical infrastructures that aid the attribution processBack to article page